zero

(redirected from cipher)
Also found in: Dictionary, Thesaurus, Medical, Legal, Acronyms, Idioms, Encyclopedia, Wikipedia.

Zero-Coupon Bond

A bond that pays no interest. It is sold at a discount from par and matures at par. These are fairly illiquid investments because they do not benefit from changes in interest rates. However, they tend to be low-risk. Zero-coupon bonds fluctuate in price, sometimes dramatically, with changes in interest rates. Sometimes zero-coupon bonds are issued as such; other times they are bonds stripped of their coupons by a financial institution and resold as zero-coupon bonds. A zero-coupon bond is less formally known as a zero.

zero

References in periodicals archive ?
For Kuznyechik, the linear transformation of each round is iterated 16 times, which is equivalent to 16 rounds of other block cipher algorithms.
The Implementation of XTEA integrated with Arabic cipher table is available on http://xtechnos.com/research/axtea/.
The aim of the survey was the identify the background knowledge and awareness of the IT-Security Admins and Managers of Sri Lanka Banks, about the RC4 cipher vulnerabilities in SSL/TLS.
Founded in 2000, CIPHER is a global cybersecurity company that delivers a wide range of products and services.
The first type involved cryptanalyses of the Simeck family block cipher. Kolbl and Roy [5] presented brief comparison results between SIMON and Simeck.
One of the widely used cryptographic algorithm is the A5/1 stream cipher which acts as the encryption for GSM (Global System for Mobile) communication.
In the U method and the UID method, the adversary first represents the block cipher structure as a matrix; then given a differential pair ([DELTA]in, [DELTA]out), he calculates the m-round intermediate difference from [DELTA]in forwardly and the (r - m)-round intermediate difference from [A.sub.out] backwardly by the matrix method.
According to Shannon having the most effective diffusion property is not sufficient to provide a secure cipher [2].
Cipher says Knowledge360 streamlines the curation of competitor information and speeds reporting with built-in dashboards, allowing users to customize what sources and information they want to see and quickly create views that can be shared across their organizations.
There are basically two ways to make a stronger cipher: the stream cipher, where the encryption rule is developed depending on a plaintext symbol's position in the stream of plaintext symbols, and the block cipher, which encrypts several plaintext symbols at once in a block [1].
Establish client encryption system in smart card chip and write secret key cipher algorithm, hash algorithm, combined secret key real-time generation algorithm, offline authentication, online authentication protocol, offline signature and encryption protocol, online signature and encryption protocol, and data including identification Bi of smart card, a three-dimensional matrix Ti of key seeds, and a three-dimensional matrix E of another set of key seeds, i = 1 - n, n is the total number of network users.
Don't peek at the answer below, and see if you can figure out the hidden message in this keyword cipher.